Security 360°: Enterprise security for the cognitive eraJosyula R. RaoSuresh Chariet al.2016IBM J. Res. Dev
Firstfilter: A cost-sensitive approach to malicious URL detection in large-scale enterprise networksLong VuP. Nguyenet al.2016IBM J. Res. Dev
Identifying malicious activities from system execution tracesEhud AharoniR. Peleget al.2016IBM J. Res. Dev
Data classification and sensitivity estimation for critical asset discoveryYoungja ParkW. Teikenet al.2016IBM J. Res. Dev
Uncovering insider threats from the digital footprints of individualsAnni CodenW.S. Linet al.2016IBM J. Res. Dev
Security intelligence for cloud management infrastructuresS. BergerShelly Garionet al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev